搜索资源列表
Internet_Attack
- 无线网络攻击方式,简要讨论了无限网络的攻击方式-Internet Attack
baowuyuan
- 在完成这篇记实文学之后,尤其在完成文稿的打字与校对之后,一股巨大的负疚感袭上心头。我不能不遗憾地告诉大家,在编辑或读者见到这篇文稿的时候,本文的主人公、一位被厄运笼罩一生最后孤寂地死去的葛连波先生已经故去十三年了!-In the literature after the completion of this documentary, especially in the completion of the typing and proofreading manuscr ipts, after a
ApplicationofDigitalWatermarkingandthebenchmarking
- 图像数字水印的应用及基准测试软件:在讨论图像数字水印的各种应用及影响图像数字水印系统的重要参数的基础上,对数字水印的各种典型 的攻击方式进行了较完整的分析,最后对现有的典型基准测试程序进行了探讨,指出了它们的局限性.-Application of Digital Watermarking and the benchmarking software: Image Watermarking in the discussion of a wide range of applications
CC
- CC攻击防御代码,ASP脚本型...php的一会再发-CC defensive attack code, ASP-based ... php scr ipt will be made one ....
gongji
- 对嵌入水印的图象进行不同的攻击 添加噪音,滤波,剪切,压缩,旋转45度-Watermark on the images embedded in a different attack to add noise, filter, shear, compression, rotating 45 degrees
tcp
- TCP协议堵塞窗口算法攻击 TCP协议堵塞窗口算法攻击 TCP协议堵塞窗口算法攻击-TCP protocol TCP congestion window algorithm to attack the agreement TCP congestion window algorithm to attack the agreement TCP congestion window algorithm to attack the agreement TCP congestion window algor
c__s
- 网络攻防基础,包含木马技术,客户端和服务器两段代码-The basis of network attack and defense, including the Trojan horse technology, two client and server code
8huanghou
- 在一个8×8国际象棋盘上,有8个皇后,每个皇后占一格;要求皇后间不会出现相互“攻击”的现象,即不能有两个皇后处在同一行、同一列或同一对角线上。问共有多少种不同的方法。 -8 × 8 in a chess set, there are 8 Queen' s, Queen' s share of each cell between Queen will not be asked each other " attack" phenomenon, that is, c
eightqueens
- 在8X8格的国际象棋上摆放八个皇后,使其不能互相攻击,即任意两个皇后都不能处于同一行、同一列或同一斜线上,问有多少种摆法。 -8X8 grid in the display of the chess Queen eight, making it unable to attack each other, that is, any two can not be Queen' s in the same line, same column or on the same slash and a
20070930_Bericht_side_channel_v2.pdf
- german side channel attack descr iption
arptool
- c++开发网络抓包分析软件,能够分析ARP协议,并防止ARP攻击-c++ development network capture analysis software, to analyze the ARP protocol, and to prevent ARP attack
qflood
- 對Quake server進行Flood攻擊,把Andy Gavin (_k3nny@Efnet, k@EnterTheGame)寫的linux下的程序移植到Win32平台下。-Flood of the Quake server to attack, and Andy Gavin (_k3nny @ Efnet, k @ EnterTheGame) written procedures under linux ported to Win32 platform.
75448151AttackPort
- 像固定的IP地址发送数据包进行攻击 像固定的IP地址发送数据包进行攻击 -As a fixed IP address to send the attack packets as a fixed IP address to send the attack packets as a fixed IP address to send the attack packets as a fixed IP address to send the attack packets
5542
- 这个游戏可以两个人对战,为什么叫做泡泡堂战车呢?因为游戏中的炸弹就像泡泡堂中的泡泡一样。在这个游戏中,游戏者控制自己的坦克奋力进攻,以确保自己有活路。游戏中的坦克所遇到的障碍物主要有墙、炸弹(泡泡)。坦克的所到之处都可以留下炸弹,炸弹会在一定时间内爆炸,一旦对手被炸到,你就赢了~ -The game can be against two people, why is it called the chariot BNB? Because the game is like a bubble bo
1
- 利用软件建立服务器之后,可以用此程序对服务器实施SYN FLOOD攻击!-After the establishment of the server software can be used to implement this program on the server SYN FLOOD attack!
Smart_Card_Applications
- An Overview of Smart Card Security. The smart card, an intelligent token, is a credit card sized plastic card embedded with an integrated circuit chip. It provides not only memory capacity, but computational capability as well. The self-containm
BATTLE_OF_SKY
- 《BATTLE OF SKY》,C++编写的平面小游戏,VC++6.0开发,操作你的角色攻击敌人,游戏有2个难度。主要是学习之用,c++的初学者可以看看。-" BATTLE OF SKY" , C++ to prepare the plane game, VC++6.0 development, the role of operations to attack your enemies, there are two difficult games. Is learning, c+
aaa
- 这是一个对于网络攻防的一些教案,介绍其中包括一至三章内容-Network attack and defense for a number of lesson plans to introduce the
queengame
- 八皇后游戏的说明: 问题的提出:八皇后是个古老而有趣的游戏,是由高斯于1850年首先提出的。 要求在国际象棋的棋盘上放置八个皇后,使其不能相互攻击,即任意两个皇后不能处于 棋盘的同一行、同一列和同一条对角线上。试问有多少种放法? 基本思想是:先把皇后放在(0,0)位置,然后把1号皇后放在(1,j)位置, 使其满足要求。接着放2号皇后,依此类推。遇到某个皇后如把她无论放在该行的任意 位置均不满足要求,则前一个皇后放置不当,须重新放置前一皇后,如8个皇后均按要 求放置
ApplicationonCopyrightProtectionofAudioDigitalWate
- 音频数字水印在版权保护中的应用 本文将数字水印技术应用于数字产品的版权保护中, 可以在MP3、CD 等作品中嵌入水印, 在人耳不能察觉的情况下达 到版权保护的目的, 并提出基于离散小波变换的音频数字水印方案和一种基于小波变换的音频数字水印的隐藏和检测算 法———基于信噪比确定伸缩因子α的自适应加性音频水印算法。-Application on Copyright Protection of Audio Digital Watermarking